CVE-2023-43500

CVSS 3.1 Score 8.8 of 10 (high)

Details

Published Sep 20, 2023
Updated: Sep 22, 2023
CWE ID 352

Summary

CVE-2023-43500 is a cross-site request forgery (CSRF) vulnerability found in Jenkins Build Failure Analyzer Plugin version 2.4.1 and earlier. This vulnerability allows attackers to connect to an attacker-specified hostname and port using an attacker-specified username and password. The vulnerability affects multiple products, including those with the identifiers swtrYl, swtrYk, swtrYh, swtrYg, swtrYj, swtrYi, caXFPn, bu2K6e, bu2K6f, kA7Ean, bu2K6c, bu2K6d, bu2K6a, bu2K6b, bu2K6Y, bu2K6Z, bu2K6W, jtKj5q, jtKj5r, bu2K6X, bu2K6U, jtKj5p, bu2K6V, bu2K6T and more. The vulnerability carries a risk score of 65 and has a high severity level according to NIST's Common Vulnerability Scoring System (CVSS). Organizations should remediate this vulnerability by updating the affected Jenkins Build Failure Analyzer Plugin to version 2.4.1 or later to mitigate the potential danger it poses for unauthorized access and misuse of sensitive information.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-43500 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options